…04. Zhang et. al. “T2FA: Transparent Two-Factor Authentication.” June 15, 2018. IEEE Access. Retrieved from https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8386653 on April 30, 2020. Back to Citation 105. Konoth R.K., van der Veen V., Bos H. (2017) How Anywhere Com…
…ted Authorization Framework for EHR Services Using Attribute-Based Encryption,” IEEE Transactions on Services Computing, Volume 14, No. 6, p. 1 (2021) (discussing that health care providers are increasingly using Cloud-based EHR services to manage ePHI, which increases the possib…
…, Predicting heart failure readmission from clinical notes using deep learning (IEEE 2019). Back to Citation 150. The ONC Program's use of the term “intervention” is different from “clinical intervention” as defined under FDA regulation that includes a range of regulated products…
….ansi.org/Standards/hfes.aspx ) following publication of the final rule. ANSI/IEEE C63.19-2011 American National Standard for Methods of Measurement of Compatibility between Wireless Communications Devices and Hearing Aids (2011) (see 412.3.1, 702.5.1). This standard provides a…
ANSI/IEEE Std 754-2019 http://754r.ucbtest.org Scope: The IEEE 754-2008 standard expired in 2019, so a minor revision was undertaken, to determine a set of relatively non-controversial upward-compatible editorial corrections and clarifications and minor enhancements to the 2008 s…
…n URI Scheme ........................16 6.4.1 Node Field Generation Without the IEEE 802 Address ........17 6.5 Lock Capability Discovery ....................................19 6.6 Active Lock Discovery ........................................19 6.7 Usage Considerations .........…
…n URI Scheme ........................16 6.4.1 Node Field Generation Without the IEEE 802 Address ........17 6.5 Lock Capability Discovery ....................................19 6.6 Active Lock Discovery ........................................19 6.7 Usage Considerations .........…
… URI Scheme ........................ 16 6.4.1 Node Field Generation Without the IEEE 802 Address ........ 17 6.5 Lock Capability Discovery .................................... 19 6.6 Active Lock Discovery ........................................ 19 6.7 Usage Considerations ......…
… URI Scheme ........................ 16 6.4.1 Node Field Generation Without the IEEE 802 Address ........ 17 6.5 Lock Capability Discovery .................................... 19 6.6 Active Lock Discovery ........................................ 19 6.7 Usage Considerations ......…
… URI Scheme ........................ 16 6.4.1 Node Field Generation Without the IEEE 802 Address ........ 17 6.5 Lock Capability Discovery .................................... 19 6.6 Active Lock Discovery ........................................ 19 6.7 Usage Considerations ......…
… URI Scheme ........................ 16 6.4.1 Node Field Generation Without the IEEE 802 Address ........ 17 6.5 Lock Capability Discovery .................................... 19 6.6 Active Lock Discovery ........................................ 19 6.7 Usage Considerations ......…
… URI Scheme ........................ 16 6.4.1 Node Field Generation Without the IEEE 802 Address ........ 17 6.5 Lock Capability Discovery .................................... 19 6.6 Active Lock Discovery ........................................ 19 6.7 Usage Considerations ......…
… URI Scheme ........................ 16 6.4.1 Node Field Generation Without the IEEE 802 Address ........ 17 6.5 Lock Capability Discovery .................................... 19 6.6 Active Lock Discovery ........................................ 19 6.7 Usage Considerations ......…
…pec closely follows ISO/IEC 15068-2:1999 (now withdrawn) which was identical to IEEE 1387.2:1995. The implementation relies on POSIX functionality as provided by a typical GNU system. It has security enhancement extensions that use GNU Privacy Guard. The scope of the spec include…
…mat employed by the Dienst system. Additionally, the proceedings from the first IEEE Metadata conference describe many community-specific metadata sets. Participants of the 1996 Metadata II Workshop in Warwick, UK [Lagoze, 1996], noted that, "new metadata sets will develop as the…